Resubmissions

04-12-2024 06:14

241204-gzjzcavpg1 7

04-12-2024 06:10

241204-gxj7bsvpcv 6

General

  • Target

    hole mole.mp3

  • Size

    552KB

  • Sample

    241204-gzjzcavpg1

  • MD5

    bbc86ff3e3f9498d204c5940d3a5237f

  • SHA1

    d6202f6377b590ff47f2017bc4cb384877355024

  • SHA256

    d91d8708bc6bca4569fc01852e44e89f1542ff2147fadba912523b18d69e7e59

  • SHA512

    7693b659421b9235e1402fd22a687f9789aee081a29b4578c4edc831a9f6dbb47817aa352d2daa6d728f1339673555af46587da88c640b1df2ac1c16f4c7a4e9

  • SSDEEP

    12288:ZzER5jsw9TI2o6YDtNVwmhfCkchH8sFEPr7t0cZ3P/E+3:S8wBY5o+fIhHPED73RPB3

Malware Config

Targets

    • Target

      hole mole.mp3

    • Size

      552KB

    • MD5

      bbc86ff3e3f9498d204c5940d3a5237f

    • SHA1

      d6202f6377b590ff47f2017bc4cb384877355024

    • SHA256

      d91d8708bc6bca4569fc01852e44e89f1542ff2147fadba912523b18d69e7e59

    • SHA512

      7693b659421b9235e1402fd22a687f9789aee081a29b4578c4edc831a9f6dbb47817aa352d2daa6d728f1339673555af46587da88c640b1df2ac1c16f4c7a4e9

    • SSDEEP

      12288:ZzER5jsw9TI2o6YDtNVwmhfCkchH8sFEPr7t0cZ3P/E+3:S8wBY5o+fIhHPED73RPB3

    • A potential corporate email address has been identified in the URL: httpswww.youtube.com@lapiseyzcbrd1

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks